Weak MFA Was Used To Successfully Sign In
Last updated
Last updated
Detects users that have successfully logged in with a weak form of Multi-Factor Authentication (MFA). For Okta OIE environments, accounts utilizing weak factors that are solely defined as recovery methods are excluded from this check.
The National Institute of Standards and Technology (NIST) recommends using one-time password solutions or cryptographical solutions such as Google Authenticator, Okta Verify, or Microsoft Authenticator as the second factor of authentication, as SMS and voice calls are susceptible to attacks.
Recommended Actions
Encourage users to use stronger authentication on a more regular basis. If that is not possible, we recommend tagging users with administrative privileges in critical services like Okta and Workday, and providing them with physical authentication solutions like Yubikey.
Compatibility